Im looking at malware which hallows out processes. I am able to break when the malware calls "WriteProcessMemory" and patch the OEP of the newly injected code with EBFE (Jmp to Self), then let the new process run attach my debugger to the new instance and dump it with the OEP figured out and everything. Ok great. Problem is, I cant reconstruct IAT. Using ImpRec, I cant seem to give it the OEP it wants (it keeps complaining). The newly injected code is in a different memory segment than the original process' .TEXT/.Data sections (does that matter?). This is a badly written question only because Im new at this and am stuck on even figuring out what to ask. Please advise. Any tips on rebuilding IAT on Malware that hallows out processes?